Chain of Custody

Our data security process actually begins at the clients’ site. From there, full Chain-of-Custody is maintained through transport to our loading dock, and all the way through the data security process.

Our locked and secured facility is under video and security surveillance 24 hours of the day, every day of the year. Throughout the flow, data bearing equipment is stored in a secure cage until processed.

All asset tags are removed and hard drives are either wiped or physically destroyed via our National Institute of Standards and Technology (NIST) 800-88 compliant process.